1 / 15

C hallenges in Protecting Critical National I nfrastructure from Cyber A ttacks

C hallenges in Protecting Critical National I nfrastructure from Cyber A ttacks. Singapore University of Technology and Design. Aditya P Mathur. Keynote@Confluence 2013 Amity University, India. September 27, 2013. Attacks.

ulmer
Télécharger la présentation

C hallenges in Protecting Critical National I nfrastructure from Cyber A ttacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Challenges in Protecting Critical National Infrastructure from Cyber Attacks Singapore University of Technology and Design Aditya P Mathur Keynote@Confluence 2013 Amity University, India September 27, 2013

  2. Attacks 2001: Queensland Australia, 264,000 gallons of sewage released in rivers and parks. 2006: Harrisburg water filtering plant, Harrisburg, USA, intruder planted malware that could affect plant’s water treatment operations. 2007: Tehama colusa canal, Willows, CA, USA; damaged computer to divert water from the Sacremento river 2008: Stuxnet: Aimed at the Iranian nuclear enrichment plant 2012: North Pole Toys: Aimed at a toy manufacturing company

  3. Questions of interest What is a Cyber Physical System (CPS)? What are the key challenges in securing CPS? Are there any fundamental design principles that ought to be used when designing or upgrading a CPS?

  4. CPS: An abstract view Monitoring and Control [SCADA, PLC, HMI, etc.] system Plant Data and control

  5. CPS: Examples Water treatment and distribution Healthcare: Pacemaker, defibrillator, insulin pump, etc. Energy: Power generation, distribution, smart metering Transportation: Driverless cars, networked traffic systems, etc.

  6. Laboratory CPS: At SUTD

  7. CPS: Systems View x: system state Physical System xk+1=Axk+Buk Actuator Sensor yk=Cxk+vk y: system output u:control input Control System Estimation and control : Network

  8. CPS Network-based Attacks Physical System Actuator Sensor y’ not y: Sensor compromised u’ not u controller compromised Control System Controller compromised Network jammed

  9. Existing Techniques Authentication Prevention Digital signatures Access control Intrusion detection

  10. Attacks on CPS: Challenge 1 Physical System Actuator Sensor y’ not y: Sensor compromised Control System How to detect? How to control given that data corruption is detected?

  11. Attacks on CPS-Challenge 2 Physical System Actuator Sensor Control System u’ not u controller compromised Controller compromised How to safeguard the physical system?

  12. Attacks on CPS-Challenge 3 Physical System Actuator Sensor u’ not u controller channelcompromised Control System Control channel compromised How to safeguard the physical system?

  13. Design Principles: Just a few for now Use a failure based design method to identify critical components that ought to be protected against cyber attacks. Include an orthogonal protection system using Intelligent Checkers [Sabaliauskaite-Mathur, CSP2013].

  14. Questions?

  15. References [Sample] Secure Control: Towards Survivable Cyber-Physical Systems. Alvaro A. CárdenasSaurabh Amin Shankar Sastry, The 28th International Conference on Distributed Computing Systems Workshop, IEEE 2008. Common Cybersecurity Vulnerabilities in Industrial Control Systems. US Department of Homeland Security. May 2011. Cyber-Physical Systems Security for Smart Grid. White Paper. ManimaranGovindarasu, Adam Hann, and Peter Sauer. February 2012. Improving the Security and Privacy of Implantable Medical Devices, William H. Maisel and Tadayoshi Kohno, New England Journal of Medicine 362(13):1164-1166, April 2010. Guide to Industrial Control Systems (ICS) Security. Keith Stouffer, Joe Falco, and Karen Scarfone. NIST. 800-02. June 2011.

More Related